Uploaded image for project: 'Apache Oltu'
  1. Apache Oltu
  2. OLTU-199

Extra data permitted in JWT header

    XMLWordPrintableJSON

Details

    • Bug
    • Status: Open
    • Major
    • Resolution: Unresolved
    • None
    • None
    • JWT

    Description

      I stumbled into this bug when writing a unit test.

      I was making sure that signature validation did not pass under the following conditions:

      ```
      header + "x" + "." + payload + "." + signature
      header + "." + payload + "x" + "." + signature
      header + "." + payload + "." + signature + "x"
      ```
      2 of the 3 correctly failed to validate because the signature was invalid, however the first case still passed signature validation. This puzzled me so I read the code to figure out what was going on.

      ```
      JWS jws = new JWSReader().read(jwt);

      CustomSignatureMethod signatureMethod = new CustomSignatureMethod();
      CustomPublicKey customPublicKey = new CustomPublicKey(keyPair.getPublic());

      return jws.validate(signatureMethod, customPublicKey);
      ```

      When you look at the JWSReader you will see:

      ```
      Builder jwsBuilder = new Builder();
      (new JWSHeaderParser(jwsBuilder)).read(decodedHeader);
      return jwsBuilder.setPayload(decodedBody).setSignature(encodedSignature).build();
      ```

      So clearly the JWSHeaderParser's read implementation isn't reading the entire contents of decodedHeader (which I confirmed is the entire header).

      Inside of the class public abstract class CustomizableEntityReader<E, B extends CustomizableBuilder<E>>

      you would find three places that return early. Two of them look like this:

      ```
      case '}':
      return;
      ```

      So as soon as the closing } in the JSON is read the remaining bytes are not parsed.

      This is bad because it means that signature validation passes when it clearly should not.

      My short term fix conceptually looks like this:

      ```
      case '}':
      if ( x.more() )

      { throw new RuntimeException("Invalid JWT header"); }

      return;
      ```

      I'm not sure that this is exploitable at the moment, but it allows extra data to be passed in JWTs and it causes many tokens to pass signature validation instead of just the actually valid token.

      Attachments

        Activity

          People

            Unassigned Unassigned
            brweber2 Bryan Weber
            Votes:
            0 Vote for this issue
            Watchers:
            1 Start watching this issue

            Dates

              Created:
              Updated: